diff --git a/landing/keyservers.react.js b/landing/keyservers.react.js index 644cf5c26..1dc5ff302 100644 --- a/landing/keyservers.react.js +++ b/landing/keyservers.react.js @@ -1,141 +1,149 @@ // @flow import { create } from '@lottiefiles/lottie-interactivity'; import * as React from 'react'; import { useIsomorphicLayoutEffect } from 'lib/hooks/isomorphic-layout-effect.react.js'; import { assetsCacheURLPrefix } from './asset-meta-data.js'; +import KeyserverFAQ from './keyserver-faq.react.js'; import css from './keyservers.css'; import ReadDocsButton from './read-docs-btn.react.js'; +import RequestAccess from './request-access.react.js'; function Keyservers(): React.Node { React.useEffect(() => { import('@lottiefiles/lottie-player'); }, []); const onEyeIllustrationLoad = React.useCallback(() => { create({ mode: 'scroll', player: '#eye-illustration', actions: [ { visibility: [0, 1], type: 'seek', frames: [0, 720], }, ], }); }, []); const onCloudIllustrationLoad = React.useCallback(() => { create({ mode: 'scroll', player: '#cloud-illustration', actions: [ { visibility: [0, 0.2], type: 'stop', frames: [0], }, { visibility: [0.2, 1], type: 'seek', frames: [0, 300], }, ], }); }, []); const [eyeNode, setEyeNode] = React.useState(null); useIsomorphicLayoutEffect(() => { if (!eyeNode) { return undefined; } eyeNode.addEventListener('load', onEyeIllustrationLoad); return () => eyeNode.removeEventListener('load', onEyeIllustrationLoad); }, [eyeNode, onEyeIllustrationLoad]); const [cloudNode, setCloudNode] = React.useState(null); useIsomorphicLayoutEffect(() => { if (!cloudNode) { return undefined; } cloudNode.addEventListener('load', onCloudIllustrationLoad); return () => cloudNode.removeEventListener('load', onCloudIllustrationLoad); }, [cloudNode, onCloudIllustrationLoad]); return ( -
- The Internet is broken today. Private user data is owned by - mega-corporations and farmed for their benefit. -
-- E2E encryption has the potential to change this equation. But - it’s constrained by a crucial limitation. -
-+ The Internet is broken today. Private user data is owned by + mega-corporations and farmed for their benefit. +
++ E2E encryption has the potential to change this equation. But + it’s constrained by a crucial limitation. +
+- Sophisticated applications rely on servers to do things that your - devices simply can’t. -
-- That’s why E2E encryption only works for simple chat apps today. - There’s no way to build a robust server layer that has access to - your data without leaking that data to corporations. -
-+ Sophisticated applications rely on servers to do things that your + devices simply can’t. +
++ That’s why E2E encryption only works for simple chat apps + today. There’s no way to build a robust server layer that has + access to your data without leaking that data to corporations. +
+In the future, people have their own servers.
-- Your keyserver is the home of your digital identity. It owns your - private keys and your personal data. It’s your password manager, - your crypto bank, your digital surrogate, and your second brain. -
-In the future, people have their own servers.
++ Your keyserver is the home of your digital identity. It owns your + private keys and your personal data. It’s your password + manager, your crypto bank, your digital surrogate, and your second + brain. +
+